QUESTION 8Which three statements are true about Oracle Entitlements Server?

A. It enables you to externalize fine-grained authorization from applications.B. It uses a centralized Policy Decision Point (PDP) that all Policy Enforcement Points (PEPs) communicate with.C. It can use either a centralized PDP or a localized PDP.D. It has an out-of-the-box integration with Oracle Adaptive Access Manager.E. Auditing is not enabled by default within the security modules.

Answer: ABE

QUESTION 9How would you configure an authentication policy for federation in Oracle Access Management 11gR2?

A. There are no authentication policies for federation.B. Authentication policies are defined in the Oracle Identity Federation (OIF) console.C. Authentication policies are definedin the Oracle Access Management console for each domain.D. Authentication policies are provided in assertions.

QUESTION 11How would you add support for additional Internet Identity Providers for Oracle Access Management Mobile and Social, other than the preconfigured ones such as Facebook and LinkedIn? (Choose the best answer.)

A. You do this by implementing theoracle.security.idaas.rp.spi.ServiceproviderJava interface.B. Support for Internet Identity Providers is limited to the ones that are available out of the box from Oracle Access Management.C. Support for Internet Identity Providers is enabled through the connectors built on the Identity Connector Framework (ICF).D. You do this by implementing theoracle.security.idaas.rp.spi.IdentityProviderJava interface.

QUESTION 16You have configured a new pattern in Oracle Adaptive Access Manager (OAAM) to capture login times of devices. Your customer wants to ensure that devices that are used outside their normal times are blocked.After creating your pattern, which two additional steps must you perform to configure OAAM to meet this requirement?

A. Create a transaction definition for the pattern.B. Create a new rule in an existing policy that contains an appropriate condition to evaluate your new pattern.C. Linkyour chosen policy to the appropriate user groups.D. Configure a block action for your new rule.E. Restart the OAAM Managed Server for the pattern to take effect.

Answer: AE

QUESTION 17Identify three attributes that are a part of mobile device fingerprinting by default when Oracle Adaptive Access Manager is used.